home *** CD-ROM | disk | FTP | other *** search
/ Information Operations Fundamentals 2001 February / Information_Operations_Fundamentals_Unclassified_Version_1.0_February_2001.iso / links.txt < prev    next >
Text File  |  2000-12-20  |  24KB  |  1 lines

  1. link1=Access&link2=Access Control&link3=Access Control List (ACL)&link4=Access Control Mechanism&link5=Access Control Officer (ACO)&link6=Access Level&link7=Access List&link8=Access Period&link9=Access Profile&link10=Access Type&link11=Accessible Space&link12=Accountability&link13=Accounting Legend Code (ALC)&link14=Accounting Number&link15=Accreditation&link16=Accreditation Package&link17=Accrediting Authority&link18=ACL&link19=ACO&link20=Add-on-Security&link21=Address Spoofing&link22=ADM&link23=ADP&link24=ADPS&link25=Adversary&link26=Advisory&link27=AE&link28=AFIWC&link29=AIG&link30=AIN&link31=AIRK&link32=AIS&link33=AISS&link34=AJ&link35=AK&link36=AKD/RCU&link37=AKDC&link38=AKMC&link39=AKMS&link40=ALC&link41=Alert&link42=Alternate COMSEC Custodian&link43=AMS&link44=ANDVT&link45=ANSI&link46=Anti-jam&link47=Anti-spoof&link48=AOR&link49=AOSS&link50=APC&link51=APL&link52=APU&link53=ARPANET&link54=ASCII&link55=ASD (C3I)&link56=ASPJ&link57=Assembly&link58=ASSIST&link59=Assurance&link60=ASU&link61=ATM&link62=Attack&link63=Attention Character&link64=Audit&link65=Audit Trail&link66=Authenticate&link67=Authentication&link68=Authentication System&link69=Authenticator&link70=Authorization&link71=Authorized Vendor&link72=Authorized Vendor Program&link73=AUTODIN&link74=Auto-Manual-System&link75=Automated Information Systems&link76=Automated Information Systems Security&link77=Automated Remote Rekeying&link78=Automated Security Monitoring&link79=AV&link80=Availability&link81=AVP&link82=Back Door&link83=Backup&link84=Banner&link85=Bell-La Padula Security Model&link86=Benign&link87=Benign Environment&link88=Beyond A1&link89=Binding&link90=Biometrics&link91=Bit Error Rate&link92=BLACK&link93=Boundary&link94=Brevity List&link95=Browsing&link96=Bulk Encryption&link97=C&A&link98=C2&link99=C2W&link100=C4&link101=CA&link102=CA&link103=Call Back&link104=Call Sign Cipher&link105=Canister&link106=Capability&link107=Cascading&link108=Category&link109=CCB&link110=CCEP&link111=CCI&link112=CCI Assembly&link113=CCI Component&link114=CCI Equipment&link115=CCO&link116=CDR&link117=CDRL&link118=CDS&link119=Central Office of Record (COR)&link120=CEOI&link121=CEPR&link122=CER&link123=CERT&link124=Certificate&link125=Certificate Management&link126=Certificate of Action Statement&link127=Certificate Revocation List&link128=Certification&link129=Certification Agent&link130=Certification Authority&link131=Certification Authority Workstation&link132=Certification Package&link133=Certification Test and Evaluation (CT&E)&link134=Certified TEMPEST Technical Authority (CTTA)&link135=CF&link136=CFD&link137=Challenge and Reply Authentication&link138=Check Word&link139=Checksum&link140=CI&link141=CIA&link142=CIAC&link143=CIK&link144=CINC&link145=Cipher&link146=Cipher Text&link147=Cipher Text Auto-Key&link148=Ciphony&link149=CIRK&link150=CIRT&link151=Civil Affairs&link152=CJCS&link153=CJCSI&link154=CJCSM&link155=CK&link156=CKG&link157=Classified Information&link158=Clearing&link159=CLMD&link160=Closed Security Environment&link161=CM&link162=CMCS&link163=CMO&link164=CNA&link165=CNCS&link166=CND&link167=CND&link168=CNK&link169=COA&link170=Code&link171=Code Book&link172=Code Group&link173=Code Vocabulary&link174=Cold Start&link175=Command and Control&link176=Command and Control Warfare&link177=Command Authority&link178=Commercial COMSEC Endorsement Program (CCEP)&link179=Common Fill Device&link180=Communications Cover&link181=Communications Deception&link182=Communications Profile&link183=Communications Security&link184=Communications Security (COMSEC)&link185=Compartmentalization&link186=Compartmented Mode&link187=Compromise&link188=Compromising Emanations&link189=COMPUSEC&link190=Computer Abuse&link191=Computer Cryptography&link192=Computer Network Attack&link193=Computer Security&link194=Computer Security&link195=Computer Security Incident&link196=Computer Security Subsystem&link197=COMSEC&link198=COMSEC Account&link199=COMSEC Account Audit&link200=COMSEC Aid&link201=COMSEC Boundary&link202=COMSEC Chip Set&link203=COMSEC Control Program&link204=COMSEC Custodian&link205=COMSEC End-Item&link206=COMSEC Equipment&link207=COMSEC Facility&link208=COMSEC Incident&link209=COMSEC Insecurity&link210=COMSEC Manager&link211=COMSEC Material&link212=COMSEC Material Control System (CMCS)&link213=COMSEC Modification&link214=COMSEC Module&link215=COMSEC Monitoring&link216=COMSEC Profile&link217=COMSEC Survey&link218=COMSEC System Data&link219=COMSEC Training&link220=Concept of Operations (CONOP)&link221=Confidentiality&link222=Configuration Control&link223=Configuration Management&link224=Confinement Channel&link225=Confinement Property&link226=CONOP&link227=Contamination&link228=Contingency Key&link229=Contingency Plan&link230=Controlled Access Protection&link231=Controlled Cryptographic Item (CCI)&link232=Controlled Security Mode&link233=Controlled Sharing&link234=Controlled Space&link235=Controlling Authority&link236=CONUS&link237=Cooperative Key Generation&link238=Cooperative Remote Rekeying&link239=COR&link240=Correctness Proof&link241=Cost-Benefit-Analysis&link242=COTS&link243=Counterdeception&link244=Counterintelligence&link245=Countermeasure&link246=Covert Channel&link247=Covert Channel Analysis&link248=Covert Storage Channel&link249=Covert Timing Channel&link250=CPS&link251=CPU&link252=Credentials&link253=Critical Infrastructures&link254=CRL&link255=CRP&link256=CRR&link257=Cryptanalysis&link258=CRYPTO&link259=Crypto-Alarm&link260=Crypto-Algorithm&link261=Crypto-Ancillary Equipment&link262=Crypto-Equipment&link263=Cryptographic&link264=Cryptographic Component&link265=Cryptographic Equipment Room&link266=Cryptographic Initialization&link267=Cryptographic Logic&link268=Cryptographic Randomization&link269=Cryptography&link270=Crypto-Ignition Key (CIK)&link271=Cryptology&link272=Cryptonet&link273=Cryptoperiod&link274=Cryptosynchronization&link275=Cryptosystem&link276=Cryptosystem Assessment&link277=Cryptosystem Evaluation&link278=Cryptosystem Review&link279=Cryptosystem Survey&link280=CSCI&link281=CSE&link282=CSM&link283=CSS&link284=CSSO&link285=CSTVRP&link286=CT&E&link287=CTAK&link288=CTTA&link289=CUP&link290=Cyclic Redundancy Check&link291=DAA&link292=DAC&link293=DAMA&link294=Dangling Threat&link295=Dangling Vulnerability&link296=Data Aggregation&link297=Data Encryption Standard (DES)&link298=Data Flow Control&link299=Data Integrity&link300=Data Origin Authentication&link301=Data Security&link302=Data Transfer Device (DTD)&link303=DCID&link304=DCS&link305=DCSP&link306=DDS&link307=Deception&link308=Decertification&link309=Decipher&link310=Decode&link311=Decrypt&link312=Dedicated Mode&link313=Default Classification&link314=Defense Information Infrastructure&link315=Defensive Information Operations&link316=Degaussing&link317=Delegated Development Program&link318=Denial of Service&link319=Depot Maintenance&link320=DES&link321=Descriptive Top-Level Specification&link322=Design Controlled Spare Part&link323=Design Documentation&link324=Designated Approving Authority&link325=DIA&link326=Dial Back&link327=DIB&link328=Digital Signature&link329=Digital Signature Algorithm&link330=DII&link331=Direct Shipment&link332=Directed-Energy Warfare&link333=DIS&link334=DISA&link335=Discretionary Access Control (DAC)&link336=DISN&link337=Distinguished Name&link338=DITSCAP&link339=DLED&link340=DMA&link341=DMS&link342=DOD (or DoD)&link343=DOD Trusted Computer System Evaluation Criteria (TCSEC)&link344=DODD&link345=DOE&link346=Domain&link347=Dominate&link348=DPL&link349=Drop Accountability&link350=DSA&link351=DSN&link352=DSVT&link353=DT&E&link354=DTD&link355=DTLS&link356=DTS&link357=DUA&link358=E Model&link359=EA&link360=EAM&link361=EC&link362=ECCM&link363=ECM&link364=ECP&link365=ECPL&link366=EDAC&link367=EDESPL&link368=EDI&link369=EDM&link370=EDR&link371=EEFI&link372=EFD&link373=EFTO&link374=EGADS&link375=EKMS&link376=Electronic Generated Key&link377=Electronic Key Management System (EKMS)&link378=Electronic Messaging Services&link379=Electronic Security&link380=Electronic Signature&link381=Electronic Warfare&link382=Element&link383=ELSEC&link384=Embedded Computer&link385=Embedded Cryptographic System&link386=Embedded Cryptography&link387=Emissions Security&link388=EMSEC&link389=Encipher&link390=Encode&link391=Encrypt&link392=Encryption Algorithm&link393=End-Item Accounting&link394=Endorsed for Unclassified Cryptographic Item&link395=Endorsement&link396=End-to-End Encryption&link397=End-to-End Security&link398=Entrapment&link399=Environment&link400=EO&link401=EP&link402=EPL&link403=EPW&link404=Erasure&link405=ERTZ&link406=ES&link407=ET&link408=ETL&link409=ETPL&link410=EUCI&link411=EV&link412=Evaluated Products List (EPL)&link413=Event&link414=EW&link415=Executive State&link416=Exercise Key&link417=Exploitable Channel&link418=Extraction Resistance&link419=Fail Safe&link420=Fail Soft&link421=Failure Access&link422=Failure Control&link423=FDDI&link424=FDIU&link425=FDO&link426=Fetch Protection&link427=FHA&link428=File Protection&link429=File Security&link430=Fill Device&link431=FIPS&link432=FIREFLY&link433=Firewall&link434=Firmware&link435=FIWC&link436=Fixed COMSEC Facility&link437=Flaw&link438=Flaw Hypothesis Methodology&link439=Flooding&link440=FOCI&link441=Formal Access Approval&link442=Formal Development Methodology&link443=Formal Proof&link444=Formal Security Policy Model&link445=Formal Top-Level Specifiction&link446=Formal Verification&link447=FOUO&link448=FQT&link449=Frequency Hopping&link450=Front-End Security Filter&link451=FSRS&link452=FSTS&link453=FTAM&link454=FTLS&link455=FTS&link456=Full Maintenance&link457=Functional Proponent&link458=Functional Testing&link459=Gateway&link460=GCCS&link461=GETS&link462=GFE&link463=GII&link464=Global Information Infrastructure&link465=GOSC&link466=GOTS&link467=Granularity&link468=GTS&link469=Guard&link470=GWEN&link471=Gypsy Verification Environment&link472=Hacker&link473=Handshaking Procedures&link474=Hard Copy Key&link475=Hardwired Key&link476=Hash Total&link477=Hashing&link478=Hashword&link479=HDM&link480=High Risk Environment&link481=High Threat Environment&link482=HN&link483=HUMINT&link484=HUS&link485=HUSK&link486=I&C&link487=I&M&link488=I&W&link489=IASE&link490=IATO&link491=IAW&link492=IBAC&link493=ICU&link494=ID&link495=Identification&link496=Identity Token&link497=Identity Validation&link498=IDS&link499=IEMATS&link500=IFF&link501=IFFN&link502=IIRK&link503=ILS&link504=Imitative Communications Deception&link505=Impersonating&link506=Implant&link507=Ina Jo&link508=Inadvertent Disclosure&link509=Incident&link510=Incident&link511=Incomplete Parameter Checking&link512=Indications and Warnings&link513=Indicator&link514=Individual Accountability&link515=Information&link516=Information Assurance&link517=Information Assurance (IA)&link518=Information Assurance Red Team&link519=Information Assurance Red Team&link520=Information Environment&link521=Information Environment&link522=Information Flow Control&link523=Information Operations&link524=Information Operations&link525=Information Security&link526=Information Superiority&link527=Information System&link528=Information System&link529=Information Systems Security (INFOSEC and/or ISS)&link530=Information Systems Security Equipment Modification&link531=Information Systems Security Manager&link532=Information Systems Security Officer&link533=Information Systems Security Product&link534=Information Warfare&link535=Information-Based Processes&link536=INFOSEC&link537=Initialize&link538=Inspectable Space&link539=Integrity&link540=Integrity Check Value&link541=Intelligence Preparation of the Battlespace&link542=Interface&link543=Interface Control Document&link544=Interim Approval&link545=Internal Security Controls&link546=Internet Protocol (IP)&link547=Internetwork Private Line Interface&link548=IO&link549=IPB&link550=IPM&link551=IPSO&link552=IRK&link553=ISDN&link554=ISO&link555=ISS&link556=ISSE&link557=ISSM&link558=ISSO&link559=IT&link560=IT&E&link561=ITAR&link562=ITSEC&link563=IW&link564=J-2&link565=J-3&link566=J-4&link567=J-5&link568=J-6&link569=J-7&link570=JC2WC&link571=JCCC&link572=JCMA&link573=JCS&link574=JCSE&link575=JFC&link576=JIB&link577=JOA&link578=JOC&link579=JOPES&link580=JPG&link581=JPO-STC&link582=JPOTF&link583=JRFL&link584=JSC&link585=JTCB&link586=JTF&link587=JWAC&link588=KAK&link589=KEK&link590=Key&link591=Key Card&link592=Key Distribution Center (KDC)&link593=Key List&link594=Key Management&link595=Key Material&link596=Key Pair&link597=Key Production Key&link598=Key Stream&link599=Key Tag&link600=Key Tape&link601=Key Updating&link602=Key-Auto-Key&link603=Keyboard Attack&link604=Key-Encryption-Key (KEK)&link605=Keying Material&link606=KG&link607=KMASE&link608=KMC&link609=KMID&link610=KMODC&link611=KMP&link612=KMPDU&link613=KMS&link614=KMSA&link615=KMUA&link616=KP&link617=KPK&link618=KSOS&link619=KVG&link620=Label&link621=Labeled Security Protections&link622=Laboratory Attack&link623=LAN&link624=LEAD&link625=LEAF&link626=Least Privilege&link627=Level of Protection&link628=Leveraging&link629=Limited Maintenance&link630=LIMS&link631=Line Conditioning&link632=Line Conduction&link633=Link Encryption&link634=List-Oriented&link635=LIWA&link636=LKG&link637=LMD&link638=LMD/KP&link639=LME&link640=LMI&link641=LOC&link642=Local Authority&link643=Local Management Device/Key Processor (LMD/KP)&link644=LOCK&link645=Lock and Key Protection System&link646=Logic Bomb&link647=Logical Completeness Measure&link648=Long Title&link649=Low Probability of Detection&link650=Low Probability of Intercept&link651=LPC&link652=LPD&link653=LPI&link654=LRIP&link655=LSI&link656=M&S&link657=MAC&link658=Magnetic Remanence&link659=Mailicious Code&link660=Maintenance Hook&link661=Maintenance Key&link662=MAISRC&link663=Malicious Applets&link664=Malicious Logic&link665=MAN&link666=Mandatory Access Control (MAC)&link667=Mandatory Modification&link668=Manipulative Communications Deception&link669=Manual Cryptosystem&link670=Manual Remote Rekeying&link671=Masquerading&link672=Master Crypto-Ignition key&link673=Material Symbol&link674=MATSYM&link675=MCCB&link676=MCEB&link677=MCEB IA&link678=MDC&link679=MEECN&link680=Memory Scavenging&link681=MEP&link682=MER&link683=Message Authentication Code&link684=Message Externals&link685=Message Indicator&link686=MHS&link687=MI&link688=MIB&link689=MIJI&link690=Military Deception&link691=Military Operations other than War&link692=Mimicking&link693=MINTERM&link694=MLS&link695=MLS PMO&link696=MLS WG&link697=MOA&link698=Mode of Operation&link699=MOOTW&link700=MOU&link701=MRT&link702=MSE&link703=Multilevel Device&link704=Multilevel Mode&link705=Multilevel Security&link706=Mutual Suspicion&link707=NACAM&link708=NACSI&link709=NACSIM&link710=NAK&link711=National Information Infrastructure&link712=National Security Information&link713=National Security Systems&link714=NATO&link715=NCA&link716=NCCD&link717=NCSC&link718=NDI&link719=Need-to-know&link720=Network&link721=Network Front-End&link722=Network Reference Monitor&link723=Network Security&link724=Network Security Architecture&link725=Network Security Officer&link726=Network Sponsor&link727=Network System&link728=Network Trusted Computing Base (NTCB)&link729=Network Trusted Computing Base (NTCB) Partition&link730=Network Weaving&link731=NGO&link732=NII&link733=NIMA&link734=NIPRNET&link735=NISAC&link736=NIST&link737=NKSR&link738=NLW&link739=NLZ&link740=NOFORN&link741=No-Lone Zone&link742=Noncooperative Remote Rekeying&link743=Nonrepudiation&link744=Nonsecret Encryption&link745=NSA&link746=NSAD&link747=NSD&link748=NSDD&link749=NSEP&link750=NSF&link751=NSI&link752=NSTAC&link753=NSTISSAM&link754=NSTISSD&link755=NSTISSI&link756=NSTISSP&link757=NTCB&link758=NTIA&link759=NTISSAM&link760=NTISSC&link761=Null&link762=O&M&link763=OADR&link764=Object&link765=Object Reuse&link766=Offensive Information Operations&link767=Off-Line Cryptosystem&link768=OMB&link769=OMRT&link770=One-Part Code&link771=One-Time Cryptosystem&link772=One-Time Pad&link773=One-Time Tape&link774=On-Line Cryptosystem&link775=OPCODE&link776=Open Security Environment&link777=Open Storage&link778=Operational Data Security&link779=Operational Key&link780=Operational Level of War&link781=Operational Waiver&link782=Operations Code&link783=Operations Security&link784=Operations Security&link785=OPFOR&link786=OPLAN&link787=OPORD&link788=OPSEC&link789=Optional Modification&link790=ORA&link791=Orange Book&link792=ORD&link793=Organizational Maintenance&link794=Organizational Registration Authority (ORA)&link795=OSD&link796=OT&E&link797=OTAD&link798=OTAR&link799=OTAT&link800=OTP&link801=OTT&link802=Overt Channel&link803=Over-The-Air Key Distribution&link804=Over-The-Air Key Transfer&link805=Over-The-Air Rekeying (OTAR)&link806=Overwrite Procedure&link807=P Model&link808=PA&link809=PAA&link810=PAAP&link811=Packet Filter&link812=PAE&link813=PAL&link814=Parity&link815=Partitioned Security Mode&link816=Passphrase&link817=Password&link818=PC&link819=PCA&link820=PCMCIA&link821=PCZ&link822=PDR&link823=PDS&link824=PDU&link825=Penetration&link826=Penetration Testing&link827=Per-Call Key&link828=Perception Management&link829=Periods Processing&link830=Permuter&link831=PES&link832=Physical Security&link833=PKA&link834=PKC&link835=PKI&link836=PKSD&link837=Plain Text&link838=PNEK&link839=POC&link840=Policy Approving Authority (PAA)&link841=Policy Creation Authority (PCA)&link842=Positive Control Material&link843=PPL&link844=PRBAC&link845=Preproduction Model&link846=Print Suppression&link847=Privacy System&link848=Private Key&link849=Privileged Access&link850=Probe&link851=Production Model&link852=PROM&link853=PROPIN&link854=Proprietary Information&link855=Protcol&link856=Protected Communications&link857=Protected Distribution Systems (PDS)&link858=Protection Philosophy&link859=Protection Ring&link860=Protective Packaging&link861=Protective Technologies&link862=Proxy&link863=PSL&link864=Psychological Operations&link865=PSYOP&link866=Public Affairs&link867=Public Cryptography&link868=Public Key Certificate&link869=Public Key Cryptography (PKC)&link870=Public Key Infrastructure (PKI)&link871=Purging&link872=PWDS&link873=QUADRANT&link874=R&D&link875=RA&link876=RACE&link877=Rainbow Series&link878=RAMP&link879=Randomizer&link880=RASP&link881=RC&link882=RDT&E&link883=Read&link884=Read Access&link885=Real Time Reaction&link886=Recovery Procedures&link887=RED&link888=RED Signal&link889=RED/BLACK Concept&link890=Reference Monitor&link891=Reference Validation Mechanism&link892=Release Prefix&link893=Remanence&link894=Remote Rekeying&link895=Repair Action&link896=Reserve Keying Material&link897=Residual Risk&link898=Residue&link899=Resource Encapsulation&link900=Risk Analysis&link901=Risk Assessment&link902=Risk Index&link903=Risk Management&link904=ROE&link905=RQT&link906=S&link907=SA&link908=SABI&link909=Safeguarding Statement&link910=Sample Key&link911=Sanitize&link912=SAO&link913=SAP&link914=SAR&link915=SARK&link916=SATE&link917=SBU&link918=Scavenging&link919=SCI&link920=SCIF&link921=Scratch Pad Store (SPS)&link922=SDNRIU&link923=SDNS&link924=SDR&link925=SE\CM&link926=Secure Communications&link927=Secure Hash Standard&link928=Secure Operating System&link929=Secure State&link930=Secure Subsystem&link931=Security Fault Analysis&link932=Security Features Users Guide (SFUG)&link933=Security Filter&link934=Security Flaw&link935=Security Inspection&link936=Security Kernel&link937=Security Label&link938=Security Net Control Station&link939=Security Perimeter&link940=Security Range&link941=Security Requirements&link942=Security Requirements Baseline&link943=Security Safeguard&link944=Security Specification&link945=Security Test & Evaluation&link946=Security Testing&link947=Seed Key&link948=Self-Authentication&link949=Sensitive Information&link950=Sensitivity Label&link951=SETA&link952=SFA&link953=SFUG&link954=SHA&link955=Shielded Enclosure&link956=Short Title&link957=SI&link958=Signals Security&link959=SIGSEC&link960=Simple Security Property&link961=Single Point Keying&link962=Single-Level Device&link963=SIO&link964=SIPRNET&link965=SISS&link966=SMG&link967=SMU&link968=Sniffer&link969=SOF&link970=Software System Test and Evaluation Process&link971=SOW&link972=Special Information Operations&link973=Special Mission Modification&link974=Speech Privacy&link975=SPK&link976=Split Knowledge&link977=SPO&link978=Spoofing&link979=Spread Spectrum&link980=SPS&link981=SRR&link982=SSE&link983=SSMP&link984=SSO&link985=SSRS&link986=ST&E&link987=Star (*) Property&link988=Start-Up KEK&link989=State Variable&link990=STE&link991=STO&link992=Storage Object&link993=Strategic Level of War&link994=STS&link995=STU&link996=Subassembly&link997=Subject&link998=Subject Security Level&link999=Sub-Registration Authority (SRA)&link1000=Superencryption&link1001=Supersession&link1002=Superuser&link1003=Supervisor State&link1004=Suppression Measure&link1005=Surrogate Access&link1006=Syllabary&link1007=Synchronous Crypto-Operation&link1008=System Administrator (SA)&link1009=System Assets&link1010=System Development Methodologies&link1011=System High&link1012=System High Mode&link1013=System Indicator&link1014=System Integrity&link1015=System Low&link1016=System Profile&link1017=System Security&link1018=System Security Engineering&link1019=System Security Evaluation&link1020=System Security Management Plan&link1021=System Security Officer&link1022=System Security Plan&link1023=TA&link1024=TACTED&link1025=TACTERM&link1026=Tactical Level of War&link1027=TAFIM&link1028=TAG&link1029=TAISS&link1030=Tampering&link1031=TC&link1032=TCB&link1033=TCD&link1034=TCSEC&link1035=TD&link1036=Technical Attack&link1037=TED&link1038=TEK&link1039=Telecommunications&link1040=Telecommunications & Automated Information Systems Security&link1041=Telecommunications Security&link1042=TEMP&link1043=TEMPEST&link1044=TEMPEST Test&link1045=TEMPEST Zone&link1046=TEP&link1047=Test Key&link1048=TFM&link1049=TFS&link1050=Threat&link1051=Threat Analysis&link1052=Threat Assessment&link1053=Threat Monitoring&link1054=Ticket-Oriented&link1055=TIM&link1056=Time Bomb&link1057=Time-Compliance Date&link1058=Time-Dependent Password&link1059=TLS&link1060=TNI&link1061=TNIEG&link1062=TPC&link1063=TPEP&link1064=TPI&link1065=Traditional COMSEC Program&link1066=Traffic Analysis&link1067=Traffic Encryption Key&link1068=Traffic Padding&link1069=Traffic-Flow Security&link1070=Training Key&link1071=Tranquility&link1072=Transmission Security&link1073=Transmission Security Key&link1074=Trap-door&link1075=TRB&link1076=TRI-TAC&link1077=Trojan Horse&link1078=Trusted Computer System&link1079=Trusted Computing Base (TCB)&link1080=Trusted Distribution&link1081=Trusted Facility Management&link1082=Trusted Facility Manual&link1083=Trusted Identification Fowarding&link1084=Trusted Path&link1085=Trusted Process&link1086=Trusted Recovery&link1087=Trusted Software&link1088=TS/SCI&link1089=TSCM&link1090=TSEC Nomenclature&link1091=TSK&link1092=Tunneling&link1093=Two-Part Code&link1094=Two-Person Control&link1095=Two-Person Integrity (TPI)&link1096=Type 1 Product&link1097=Type 2 Product&link1098=Type 3 Algorithm&link1099=Type 4 Algorithm&link1100=U&link1101=U.S.&link1102=U.S. Person&link1103=U.S.-Controlled Facility&link1104=U.S.-Controlled Space&link1105=UA&link1106=UIRK&link1107=UIS&link1108=Unauthorized Disclosure&link1109=Unclassified&link1110=Untrusted Process&link1111=Updating&link1112=UPP&link1113=USDE&link1114=User&link1115=User ID&link1116=User Partnership Program&link1117=User Profile&link1118=User Representative&link1119=USG&link1120=USIA&link1121=V Model&link1122=Validation&link1123=VAP&link1124=Variant&link1125=Verification&link1126=Verified Design&link1127=Virtual Password&link1128=Virtual Private Network (VPN)&link1129=Virus&link1130=VIT&link1131=VPN&link1132=VST&link1133=Vulnerability&link1134=Vulnerability&link1135=Vulnerability Analysis&link1136=Vulnerability Assessment&link1137=WAN&link1138=WG&link1139=Work Factor&link1140=Worm&link1141=Write&link1142=Write Access&link1143=WWMCCS&link1144=XDM/X Model&link1145=Zero Fill&link1146=Zeroize&link1147=Zone of Control&link1148=linksLoaded=yes